Results 1 - 10
of
17
High-Resolution Proton and Carbon- 13 NMR of Membranes: Why Sonicate??
, 1987
"... ABSTRACT: We have obtained high-field (1 1.7-T) proton and carbon-13 Fourier transform (FT) nuclear magnetic resonance (NMR) spectra of egg lecithin and egg lecithin-cholesterol (1: 1) multibilayers, using “magic-angle ” sample spinning (MASS) techniques, and sonicated egg lecithin and egg lecithin ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
than with the more dilute, sonicated systems. With the 1: 1 lecithin-cholesterol systems, proton MASS N M R spectra are virtually identical with conventional FT spectra of sonicated samples, while with 13C NMR, we demonstrate that most I3C nuclei in the cholesterol moiety can be monitored, even though
I/O Paravirtualization at the Device File Boundary
"... Paravirtualization is an important I/O virtualization technol-ogy since it uniquely provides all of the following benefits: the ability to share the device between multiple VMs, sup-port for legacy devices without virtualization hardware, and high performance. However, existing paravirtualization so ..."
Abstract
- Add to MetaCart
changes to ap-plications or device drivers and providing fault and device data isolation between guest VMs despite device driver bugs. We implement Paradice for x86, the Xen hypervisor, and the Linux and FreeBSD OSes. Our implementation paravirtual-izes various GPUs, input devices, cameras, an audio
1CloudRand: Building Heterogeneous and Moving-target Port Interfaces for Networked Systems
"... Abstract—Some fundamental reasons why our networked sys-tems are still vulnerable to network attacks are: (1) they are more open than necessary; (2) they are homogeneous, i.e., the same way to exploit a vulnerability on one machine is easily applicable to many other machines (which is particularly a ..."
Abstract
- Add to MetaCart
a severe concern in cloud computing environments when virtual machines images are heavily reused/cloned); (3) current net-worked services are merely static targets, i.e., they are easily predictable and do not change. While network authentication and access control mechanisms such as firewall
De-indirection for Flash-based Solid State Drives
, 2013
"... ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the ..."
Abstract
- Add to MetaCart
ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the moment when they took me as their student and the joy and hope in my heart. Andrea and Remzi have showed me what systems research is like and how much fun and challenging it can be. Before this journey with them, I had always liked and believed in the beauty of mathematics and theory. My initial interest in systems research happened when I took Remzi’s Advanced Operating Systems
On the validity of the Boltzmann equation for short range potentials
"... ABSTRACT. We consider a classical system of point particles interacting by means of a short range potential. We prove that, in the low–density (Boltzmann–Grad) limit, the system behaves, for short times, as predicted by the associated Boltzmann equation. This is a revisitation and an extension of th ..."
Abstract
- Add to MetaCart
ABSTRACT. We consider a classical system of point particles interacting by means of a short range potential. We prove that, in the low–density (Boltzmann–Grad) limit, the system behaves, for short times, as predicted by the associated Boltzmann equation. This is a revisitation and an extension of the thesis of King [9] (appeared after the well known result of Lanford [10] for hard spheres) and of a recent paper by Gallagher et al [5]. Our analysis applies to any stable and smooth potential. In the case of repulsive potentials
Raj Jain! Routing vs Switching
"... 1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP ..."
Abstract
- Add to MetaCart
1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP
Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks
"... We present Flush, a reliable, high goodput bulk data trans-port protocol for wireless sensor networks. Flush provides end-to-end reliability, reduces transfer time, and adapts to time-varying network conditions. It achieves these proper-ties using end-to-end acknowledgments, implicit snooping of con ..."
Abstract
- Add to MetaCart
We present Flush, a reliable, high goodput bulk data trans-port protocol for wireless sensor networks. Flush provides end-to-end reliability, reduces transfer time, and adapts to time-varying network conditions. It achieves these proper-ties using end-to-end acknowledgments, implicit snooping of control information, and a rate-control algorithm that op-erates at each hop along a flow. Using several real network topologies, we show that Flush closely tracks or exceeds the maximum goodput achievable by a hand-tuned but fixed rate for each hop over a wide range of path lengths and varying network conditions. Flush is scalable; its effective bandwidth over a 48-hop wireless network is approximately one-third of the rate achievable over one hop. The design of Flush is sim-plified by assuming that different flows do not interfere with each other, a reasonable restriction for many sensornet ap-plications that collect bulk data in a coordinated fashion, like structural health monitoring, volcanic activity monitoring, or protocol evaluation. We collected all of the performance data presented in this paper using Flush itself.
Routing and Broadcasting in Ad-Hoc Networks
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract
- Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present the work on various conferences, for which I thank him. I would also like to thank Prof. Dr. Roger Wattenhofer, responsible for the Koreferat of this work. Also, Prof. Dr. Oscar Nierstrasz who was willing to be the co-examinator of this work deserves many thanks. Many thanks go to my colleagues of the RVS group and of the IAM for our various interesting discussions about all kinds of topics and for making the institute a very pleasant and friendly place to work at. Special thanks go to David Steiner, Marc Steinemann, Matthias Scheidegger, Florian Baumgartner, Ruy De Oliveira, and Attila Weyland. There are many students who worked with me and helped a lot in developing and implementing. Among them I especially thankful to Thomas Bernoulli,
Results 1 - 10
of
17